Sciweavers

2379 search results - page 389 / 476
» Computer Science in the Information Age
Sort
View
WISEC
2010
ACM
15 years 4 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
GROUP
2010
ACM
15 years 2 months ago
Coordination by avoidance: bringing things together and keeping them apart across hospital departments
Coordination is central in CSCW systems design, where it is often considered as a process of bringing artifacts and activities together and making them part of a larger system. In...
Naja Holten Møller, Paul Dourish
AISS
2010
171views more  AISS 2010»
14 years 11 months ago
An Investigation into Influence Factor of Student Programming Grade Using Association Rule Mining
Computer programming is one of the most essential skills which each graduate has to acquire. However, there are reports that they are unable to write a program well. Researches in...
Mohamad Farhan Mohamad Mohsin, Mohd Helmy Abd Waha...
CHI
2009
ACM
16 years 4 months ago
Multi-point touch input method for Korean text entry
Multi-touch interfaces are becoming popular as a new input means for the various applications. In this paper, we suggest a new Korean text entry method using a multi-touch interfa...
Heesook Shin, Woohun Lee, Geehyuk Lee, Ilyeon Cho
VISUALIZATION
2005
IEEE
15 years 9 months ago
Interactive Visual Analysis and Exploration of Injection Systems Simulations
Simulations often generate large amounts of data that require use of SciVis techniques for effective exploration of simulation results. In some cases, like 1D theory of fluid dyn...
Kresimir Matkovic, Mario Jelovic, Josip Juric, Zol...